kkj AT icu.ac.kr A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of the sender to any third party if the sender repudiates her signature later. In this paper, after showing some weaknesses in Wu et al.’s [21] and Huang et al’s [10] convertible authenticated encryption schemes, we propose a practical convertible authenticated encryption scheme using self-certified public keys and then extend it to one with message linkages when the signing message is large. Each scheme could provide semantic security of the message, the signer’s public key can be simultaneously authenticated in checking a signature ’ validity and onl...
Authenticated encryption schemes allow the signer to generate an authenticated ciphertext such that ...
Signcryption is a cryptographic primitive that performs digital signature and public key encryption ...
[[abstract]]Recently, Tseng et al. proposed an authenticated encryption scheme using self-certi- fie...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
The digital signature provides the functions of integration, authentication, and non-repudiation for...
In this article, we present an authenticated encryption scheme with message linkages used to deliver...
[[abstract]]In this article, we present an authenticated encryption scheme with message linkages use...
The digital signature provides the signing message with functions like authentication, int...
[[abstract]]In this paper, we first adopt the concept of self-certified public keys to propose a new...
This paper proposes a provable secure scheme for convertible authenticated encryption. The scheme al...
Recently, Tseng et al. proposed an authenticated encryption scheme using self-certified public keys....
Authenticated encryption schemes allow the signer to generate an authenticated ciphertext such that ...
Signcryption is a cryptographic primitive that performs digital signature and public key encryption ...
[[abstract]]Recently, Tseng et al. proposed an authenticated encryption scheme using self-certi- fie...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a m...
The digital signature provides the functions of integration, authentication, and non-repudiation for...
In this article, we present an authenticated encryption scheme with message linkages used to deliver...
[[abstract]]In this article, we present an authenticated encryption scheme with message linkages use...
The digital signature provides the signing message with functions like authentication, int...
[[abstract]]In this paper, we first adopt the concept of self-certified public keys to propose a new...
This paper proposes a provable secure scheme for convertible authenticated encryption. The scheme al...
Recently, Tseng et al. proposed an authenticated encryption scheme using self-certified public keys....
Authenticated encryption schemes allow the signer to generate an authenticated ciphertext such that ...
Signcryption is a cryptographic primitive that performs digital signature and public key encryption ...
[[abstract]]Recently, Tseng et al. proposed an authenticated encryption scheme using self-certi- fie...